Vulnerability Name: | CVE-2017-9841 (CCN-127819) | ||||||||||||||||||||||||||||||||||||||||
Assigned: | 2017-06-27 | ||||||||||||||||||||||||||||||||||||||||
Published: | 2017-06-27 | ||||||||||||||||||||||||||||||||||||||||
Updated: | 2022-04-18 | ||||||||||||||||||||||||||||||||||||||||
Summary: | Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI. | ||||||||||||||||||||||||||||||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.8 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
8.8 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||||||||||
Vulnerability Type: | CWE-94 | ||||||||||||||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2017-9841 Source: MISC Type: Third Party Advisory http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/ Source: BID Type: Broken Link 101798 Source: CCN Type: BID-101798 PHPUnit CVE-2017-9841 Arbitrary Code Execution Vulnerability Source: SECTRACK Type: Broken Link 1039812 Source: XF Type: UNKNOWN phpunit-cve20179841-code-exec(127819) Source: MISC Type: Patch, Third Party Advisory https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5 Source: CCN Type: phpunit GIT Repository phpunit Source: MISC Type: Patch, Third Party Advisory https://github.com/sebastianbergmann/phpunit/pull/1956 Source: CCN Type: Packet Storm Security [02-02-2022] PHP Unit 4.8.28 Remote Code Execution Source: GENTOO Type: Third Party Advisory GLSA-201711-15 Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY KNOWN EXPLOITED VULNERABILITIES CATALOG Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [02-02-2022] Source: CCN Type: Oracle CPUOct2021 Oracle Critical Patch Update Advisory - October 2021 Source: MISC Type: Patch, Third Party Advisory https://www.oracle.com/security-alerts/cpuoct2021.html Source: CCN Type: WhiteSource Vulnerability Database CVE-2017-9841 | ||||||||||||||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
BACK |